Home
Explore
Submit Search
Upload
Login
Signup
OWASP Top 10 Mobile Risks
Report
Jack Mannino
Follow
CEO/Founder at nVisium Security Inc.
Sep. 27, 2011
•
0 likes
•
38,960 views
1
of
44
OWASP Top 10 Mobile Risks
Sep. 27, 2011
•
0 likes
•
38,960 views
Download Now
Download to read offline
Report
Technology
T
Jack Mannino
Follow
CEO/Founder at nVisium Security Inc.
Recommended
Continuous Deployment of your Application @JUGtoberfest
Marcin Grzejszczak
1.5K views
•
93 slides
Owasp Mobile Top 10 – 2014
n|u - The Open Security Community
7.8K views
•
16 slides
OWASP Mobile Security: Top 10 Risks for 2017
TecsyntSolutions
1.5K views
•
29 slides
Secure Android Apps- nVisium Security
Jack Mannino
3K views
•
44 slides
The six step guide to practical project management
MindGenius
18.9K views
•
27 slides
ChatGPT webinar slides
Alireza Esmikhani
18.1K views
•
36 slides
More Related Content
Recently uploaded
How SACCOs can increase their memberships AD_compressed (1).pdf
CoretecDigital
75 views
•
14 slides
GDSC INFO.pptx
AshishChanchal1
36 views
•
15 slides
FewShotExamples.pptx
Alok Ranjan
20 views
•
3 slides
Carrom Pool Mod APK.docx
RayJ12
15 views
•
6 slides
GDSC SRMCEM Info Session 2023
HariOM Dwivedi
56 views
•
8 slides
Workshop on IoT and Basic Home Automation_BAIUST.pptx
Redwan Ferdous
27 views
•
126 slides
Recently uploaded
(20)
How SACCOs can increase their memberships AD_compressed (1).pdf
CoretecDigital
•
75 views
GDSC INFO.pptx
AshishChanchal1
•
36 views
FewShotExamples.pptx
Alok Ranjan
•
20 views
Carrom Pool Mod APK.docx
RayJ12
•
15 views
GDSC SRMCEM Info Session 2023
HariOM Dwivedi
•
56 views
Workshop on IoT and Basic Home Automation_BAIUST.pptx
Redwan Ferdous
•
27 views
NTGapps DTB Platform.pdf
Mustafa Kuğu
•
165 views
#11 DataWeave Extension Library using Visual Studio Code
AnoopRamachandran13
•
79 views
Orbyfy Grid e-Services_vFx.pdf
Orbyfy
•
19 views
Mitigating Common CloudStack Instance Deployment Failures
ShapeBlue
•
109 views
Testing and Developing GraphQL APIs
Postman
•
21 views
NoSQL Data Migration Masterclass - Session 1 Migration Strategies and Challenges
ScyllaDB
•
53 views
CloudStack Object Storage Framework & Demo
ShapeBlue
•
109 views
dvss.ppt
SaikrishnaCheruvu1
•
354 views
Doorsvision-The-Future-of-Smart-Communities gama adj.pdf
Mustafa Kuğu
•
84 views
GDSC23 SAC - Info Session GDSC.pptx
SAC
•
221 views
Deploying CloudStack with Ceph
ShapeBlue
•
108 views
AWS Toolkit.pptx
Brandon Minnick, MBA
•
54 views
An Introduction To Using ChatGPT For Business
Paul Nguyen
•
56 views
zkStudyClub - Lasso/Jolt (Justin Thaler, GWU/a16z)
Alex Pruden
•
17 views
Featured
Staying Cool During Summer
Deborah Davis
27.9K views
•
8 slides
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
DevGAMM Conference
2.2K views
•
12 slides
Barbie - Brand Strategy Presentation
Erica Santiago
21.2K views
•
46 slides
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Applitools
52.7K views
•
138 slides
12 Ways to Increase Your Influence at Work
GetSmarter
399.8K views
•
64 slides
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Saba Software
24.7K views
•
64 slides
Featured
(20)
Staying Cool During Summer
Deborah Davis
•
27.9K views
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
DevGAMM Conference
•
2.2K views
Barbie - Brand Strategy Presentation
Erica Santiago
•
21.2K views
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Applitools
•
52.7K views
12 Ways to Increase Your Influence at Work
GetSmarter
•
399.8K views
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Saba Software
•
24.7K views
Introduction to C Programming Language
Simplilearn
•
7.9K views
The Pixar Way: 37 Quotes on Developing and Maintaining a Creative Company (fr...
Palo Alto Software
•
87.9K views
9 Tips for a Work-free Vacation
Weekdone.com
•
6.9K views
I Rock Therefore I Am. 20 Legendary Quotes from Prince
Empowered Presentations
•
142.5K views
How to Map Your Future
SlideShop.com
•
274.5K views
Beyond Pride: Making Digital Marketing & SEO Authentically LGBTQ+ Inclusive -...
AccuraCast
•
3.2K views
Read with Pride | LGBTQ+ Reads
Kayla Martin-Gant
•
974 views
Exploring ChatGPT for Effective Teaching and Learning.pptx
Stan Skrabut, Ed.D.
•
55.8K views
How to train your robot (with Deep Reinforcement Learning)
Lucas García, PhD
•
41.9K views
4 Strategies to Renew Your Career Passion
Daniel Goleman
•
121.5K views
The Student's Guide to LinkedIn
LinkedIn
•
86.5K views
Different Roles in Machine Learning Career
Intellipaat
•
12.1K views
Defining a Tech Project Vision in Eight Quick Steps pdf
TechSoup
•
9.4K views
The Hero's Journey (For movie fans, Lego fans, and presenters!)
Dan Roam
•
28.9K views
OWASP Top 10 Mobile Risks
CEO
Principal Consultant
Principal Consultant
WhyUnique and different
security risks
Goal To build
security into mobile dev. life cycle
Very different from
traditional web app model due to wildly varying use cases and usage patterns
Must consider more
than the ‘apps’
Remote web services
Platform integration (iCloud,
C2DM)
Focused on areas
of risk rather than individual vulnerabilities
Weighted utilizing the
OWASP Risk Rating Methodology
https://www.owasp.org/index.php/OWASP_Risk_Rating_Methodology
Applies to locally
stored data + cloud synced
Generally a result
of:
Not encrypting data
Caching data not
intended for long-term storage
Weak or global
permissions
Credentials disclosed
Privacy violations
Never use public
storage areas (ie- SD card)
Leverage secure containers
and platform provided file encryption APIs
Not mobile specific
per se, but essential to get right
We still can’t
trust the client
Luckily, we understand
these issues well
Leverage the wealth
of knowledge that is already out there
OWASP Web Top
10, Cloud Top 10, Web Services Top 10
Yes, this unfortunately
happens often
Weakly encrypted data
in transit
Strong encryption, but
ignoring security warnings
Ignoring certificate validation
errors
Tampering w/ data
in transit
When users connected
via wifi, apps automatically sent the token in an attempt to automatically synchronize data from server
Sniff this value,
impersonate the user
This includes data
over carrier networks, WiFi, and even NFC
Pure web apps
Hybrid web/native apps
Some familiar faces
XSS and HTML
Injection
SQL Injection
New and exciting
twists
Abusing phone dialer
+ SMS
Toll fraud
Use prepared statements
for database calls…concatenation is still bad, and always will be bad
Some apps rely
solely on immutable, potentially compromised values (IMEI, IMSI, UUID)
Hardware identifiers persist
across data wipes and factory resets
Out-of-band doesn’t work
when it’s all the same device
Why? Convenience and
usability
Apps maintain sessions
via
HTTP cookies
OAuth tokens
SSO authentication services
Unauthorized access
Ensure that tokens
can be revoked quickly in the event of a lost/stolen device
Similar but different
depending on platform
iOS- Abusing URL
Schemes
Android- Abusing Intents
Several attack vectors
Malicious apps
Data exfiltration
Prompt the user
for additional authorization before allowing
Sensitive data ends
up in unintended places
Web caches
Keystroke logging
Screenshots (ie- iOSbackgrounding)
Logs (system, crash)
Temp directories
Remove sensitive data
before screenshots are taken, disable keystroke logging per field, and utilize anti-caching directives for web content
Debug your apps
before releasing them to observe files created, written to, or modified in any way
Carefully review any
third party libraries you introduce and the data they consume
Broken implementations using
strong crypto libraries
Custom, easily defeated
crypto implementations
Encoding != encryption
Obfuscation != encryption
Privilege escalation
Leverage battle-tested crypto
libraries vice writing your own
Apps can be
reverse engineered with relative ease
Code obfuscation raises
the bar, but doesn’t eliminate the risk
Commonly found “treasures”:
API keys
Passwords
Keep proprietary and
sensitive business logic on the server
RC1 then becomes
‘Final v1.0’
12 month revision
cycle
Rapidly evolving platforms
Stale data =
not as useful
We’ve identified the
issues…now we have to fix them
Platforms must mature,
frameworks must mature, apps must mature
Zach Lanier zach.lanier@intrepidusgroup.comhttp://twitter.com/quine
Mike Zusmanmike.zusman@carvesystems.comhttp://twitter.com/schmoilito